Abstract
Protecting children from the risks posed by negative influences in the online environment (that is, cyber-safety) is a growing concern within the Australian community. In this study, the views of 151 individuals and community stakeholder organizations, which represent the interests of children's cyber-safety in Australia, were analysed using content coding and analysis techniques. The analysis suggests that, given the accessibility of the online environment, stakeholders may need to exercise structured controls for child safety. In examining the major cyber threats and responses identified by the stakeholders, the study found that cyber-safety education and awareness programs are considered to represent the main effective and viable threat response. In addition, the research uncovered cyber bullying as a ‘whole of community’ problem that might be addressed through robust bullying prevention policies and programs, and improved resources and training for teachers, school principals and parents. The study notes that current policy directions for children's cyber-safety will need to flow through to every layer of the community.
Similar content being viewed by others
References
Agatston, P., Kowalski, R. and Limber, S. (2007) Students’ perspectives on cyber bullying. Journal of Adolescent Health 41 (6): S59–S60.
Amoroso, E. (1994) Fundamentals of Computer Security Technology. Upper Saddle River, NJ: Prentice Hall.
Australian Bureau of Statistics. (2009) Household Use of Information Technology, Australia 2008–2009, Cat. No. 8146.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8146.0.
Australian Bureau of Statistics. (2011) Internet Activity, Australia December 2010, Cat. No. 8153.0. Canberra, Australia: ABS, http://www.abs.gov.au/ausstats/abs@.nsf/mf/8153.0/.
Australian Communications and Media Authority. (2008) Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety: Second Annual Report to the Minister for Broadband, Communications and the Digital Economy. Canberra, Australia: ACMA.
Australian Communication and Media Authority. (2009) Use of Electronic Media and Communications: Early Childhood to Teenage Years. Findings from Growing Up in Australia: The Longitudinal Study of Australian Children (3 to 4 and 7 to 8-year-olds), and Media and Communications in Australian Families (8 to 17-year-olds), 2007. Canberra, Australia: ACMA.
Australian Communication and Media Authority. (2011) CyberSmart Cyber-safety Program. Canberra, Australia: ACMA, http://www.cybersmart.gov.au/.
Bauer, J. and van Eeten, M. (2009) Cybersecurity: Stakeholder incentives, externalities and policy options. Telecommunications Policy 33 (10–11): 706–719.
Beran, T. and Li, Q. (2005) Cyber-harassment: A study of a new method for an old behavior. Journal of Educational Computing Research 32 (3): 265–277.
Berson, I. and Berson, M. (2003) Digital literacy for effective citizenship: Cybersafety, digital awareness, and media literacy. Social Education 67 (3): 164–167.
Berson, I., Berson, M. and Berson, J. (2002) Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States. Journal of School Violence 1 (2): 51–72.
Bhaskar, R. (2006) State and local law enforcement is not ready for a cyber katrina. Communications of the ACM 49 (2): 81–83.
Bissonette, A. (2009) Cyber Law: Maximizing Safety and Minimizing Risk in Classrooms. Thousand Oaks, CA: Corwin.
Brown, K., Jackson, M. and Cassidy, W. (2006) Cyber-bullying: Developing a policy to direct responses that are equitable and effective in addressing this special form of bullying. Canadian Journal of Educational Administration and Policy 57 (December): 8–11.
Burns, R., Whitworth, K. and Thompson, C. (2004) Assessing law enforcement preparedness to address Internet fraud. Journal of Criminal Justice 32 (5): 477–493.
Bushman, B. and Huesmann, L. (2006) Short-term and long-term effects of violent media on aggression in children and adults. Archives of Pediatrics and Adolescent Medicine 160 (4): 348–352.
Butcher, S. (2011) Brodie's Suicide prompts Law on Bullying. The Melbourne Age, Australia, http://www.theage.com.au/small-business/brodies-suicide-prompts-law-on-bullying-20110405-1czub.html, accessed 5 April 2011.
Campbell, M. (2005) Cyber bullying: An old problem in a new guise? Australian Journal of Guidance and Counselling 15 (1): 68–76.
Commonwealth of Australia. (2010) Inquiry into Cyber-Safety. Joint Select Committee on Cyber-Safety, http://www.aph.gov.au/house/committee/jscc/index.htm.
Commonwealth of Australia. (2011) High Wire Act: Cyber-Safety and the Young, Joint Select Committee on Cyber-Safety (June).
Corley, K. and Gioia, D. (2004) Identity ambiguity and change in the wake of a corporate spin-off. Administrative Science Quarterly 49 (2): 173–208.
CrimTrac Agency. (2009) In focus: CETS/ANVIL project. OnTrac 2 (3): 6–9.
Cross, D. et al (2009) Australian Covert Bullying Prevalence Study (ACBPS). Perth, Australia: Child Health Promotion Research Centre, Edith Cowan University.
Denzin, N. and Lincoln, Y. (2005) The Handbook of Qualitative Research, 3rd edn. Thousand Oaks, CA: Sage Publications.
Donaghey, K. (2011) Cyber bullying victim Dannii sanders let down by authorities. Courier Mail, Australia, http://www.couriermail.com.au/news/queensland/cyber-bullying-victim-dannii-sanders-let-down-by-mental-health-system-say-parents/story-e6freoof-1226100469604, accessed 24 July.
Freeman, R., Wicks, A. and Parmar, B. (2004) Stakeholder theory and ‘the corporate objective revisited'. Organization Science 15 (3): 364–369.
Gentile, D. and Gentile, J. (2008) Violent video games as exemplary teachers: A conceptual analysis. Journal of Youth and Adolescence 37 (2): 127–141.
Goodstein, A. (2007) Totally Wired: What Teens and Tweens are Really Doing Online. New York: St Martin's Press.
Hinduja, S. and Patchin, J. (2007) Offline consequences of online victimization: School violence and delinquency. Journal of School Violence 6 (3): 89–112.
Hinduja, S. and Patchin, J. (2008) Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior 29 (2): 129–156.
Hinduja, S. and Patchin, J. (2009) Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks, CA: Corwin Press Sage.
Jain, A. (2005) Cyber Crime Issues, Threats and Management. Delhi, India: Isha Books.
Jakubiak, D. (2010) A Smart Kid's Guide to Avoiding Online Predators. New York: Rosen Publishing Group.
Johnson, E. (2006) Security awareness: Switch to a better programme. Network Security 2006 (2): 15–18.
Johnson, S. (2004) Keep your Kids Safe on the Internet. New York: McGraw-Hill/Osborne.
Juvonen, J. and Gross, E. (2008) Extending the school grounds? – Bullying experiences in cyberspace. Journal of School Health 78 (9): 496–505.
Keith, S. and Martin, M. (2005) Cyber-bullying: Creating a culture of respect in a cyber world. Children and Youth 13 (4): 224–228.
Kids Helpline. (2011) Kids helpline services, http://www.kidshelp.com.au, accessed 5 May 2011.
Klomek, A., Marrocco, F., Kleinman, M., Schonfeld, I. and Gould, M. (2008) Peer victimization, depression, and suicidiality in adolescents. Suicide and Life-Threatening Behavior 38 (2): 166–180.
Kowalski, R. and Limber, S. (2008) Electronic bullying among middle school students. Journal of Adolescent Health 41 (6): S22–S30.
Kowalski, R., Limber, S. and Agatston, P. (2007) Cyber Bullying: Bullying in the Digital Age. Malden, MA: Wiley/Blackwell.
LaRose, R., Rifon, N. and Enbody, R. (2008) Promoting personal responsibility for Internet safety. Communications of the ACM 51 (3): 71–76.
Li, Q. (2007a) Bullying in the new playground: Research into cyberbullying and cyber victimization. Australasian Journal of Educational Technology 23 (4): 435–454.
Li, Q. (2007b) New bottle but old wine: A research of cyberbullying in schools. Computers in Human Behavior 23 (4): 1777–1791.
Lifeline. (2011) Crisis Support, Suicide Prevention, Mental Health Support, http://www.lifeline.org.au.
Livingstone, S. and Helsper, E. (2007) Taking risks when communicating on the Internet: the role of offline social-psychological factors in young people's vulnerability to online risks. Information, Communication & Society 10 (5): 619–644.
Lodge, J. and Frydenberg, E. (2007) Cyber-bullying in Australian schools: Profiles of adolescent coping and insights for school practitioners. The Australian Educational and Developmental Psychologist 24 (1): 45–58.
Mansell, R. and Collins, B. (2005) Trust and Crime in Information Societies. Cheltenham, UK: Edward Elgar Publishing.
McCarthy, M. (2004) Filtering the internet: The children's internet protection act. Educational Horizons 82 (2): 108–113.
McQuade, S., Colt, J. and Meyer, N. (2009) Cyber Bullying: Protecting Kids and Adults from Online Bullies. Santa Barbara, CA: ABC-CLIO.
Microsoft Corporation. (2005) Tool Thwarts Online Child Predators: Microsoft helped international law enforcement create the Child Exploitation Tracking System as part of a continuing collaboration to stop those who prey on children online, http://www.microsoft.com/presspass/features/2005/apr05/04-07CETS.mspx, accessed 12 May 2011.
Miles, M. and Huberman, A. (1997) Qualitative Data Analysis – An Expanded Case Book, 2nd edn. Thousand Oaks, CA: Sage Publications.
Mitchell, K., Finkelhor, D. and Wolak, J. (2005) Protecting youth online: Family use of filtering and blocking software. Child Abuse and Neglect 29 (7): 753–765.
Myers, J., McCaw, D. and Hemphill, L. (2011) Responding to Cyber Bullying: An Action Tool for School Leaders. Thousand Oaks, CA: Sage Publications.
Palfrey, J., Boyd, D., Sacco, D. and DeBonis, L. (2008) Enhancing Child Safety and Online Technologies. Boston, MA: Berkman Center for Internet and Society, Harvard University.
Parliament of Victoria. (2011) Crimes Amendment (Bullying) Bill 2011, http://www.austlii.edu.au/au/legis/vic/bill/cab2011266/, accessed 1 June 2011.
Philippsohn, S. (2001) Trends in cybercrime: An overview of current financial crimes on the internet. Computers & Security 20 (1): 53–69.
Privitera, C. and Campbell, M. (2009) Cyberbullying: The new face of workplace bullying? CyberPsychology and Behavior 12 (4): 395–400.
Rogers, V. (2010) Cyberbullying: Activities to Help Children and Teens to Stay Safe in a Texting, Twittering, Social Networking World. London, UK: Jessica Kingsley Publishers.
Roland, E. (2002) Bullying, depressive symptoms and suicidal thoughts. Educational Research 44 (1): 55–67.
Shariff, S. (2009) Confronting Cyberbullying: What Schools need to know to Control Misconduct and Avoid Legal Consequences. Cambridge, UK: Cambridge University Press.
Smith, G. (2007) How to Protect Your Children on the Internet: A Roadmap for Parents and Teachers. Westport, CT: Greenwood Publishing Group.
Smith, P., Mahdavi, J., Carvalho, M., Fisher, S., Russell, S. and Tippett, N. (2008) Cyberbullying: Its nature and impact in secondary school pupils. Journal of Child Psychology and Psychiatry 49 (4): 376–385.
Sommer, P. (2004) The future for the policing of cybercrime. Computer Fraud & Security 2004 (1): 8–12.
Sommers, M. (2008) The Dangers of Online Predators. New York: Rosen Publishing.
Spears, B., Slee, P., Owens, L. and Johnson, B. (2008) Behind the Scenes: Insights into the Human Dimension of Covert Bullying. Adelaide, Australia: Hawke Research Institute for Sustainable Societies, University of South Australia.
Sullivan, M. (2008) Online Predators. Englewood Cliffs, NJ: Xulon Press.
Thomas, D. and Loader, B. (2003) Cybercrime: Law Enforcement, Security and Surveillance in the Information Age. New York: Routledge.
Thomson, M. and von Solms, R. (1998) Information security awareness: Educating your users effectively. Information Management & Computer Security 6 (4): 167–173.
Trolley, B. and Hanel, C. (2010) Cyber Kids, Cyber Bullying, Cyber Balance. Thousand Oaks, CA: Corwin Sage.
UK Office of Cyber Security. (2009) Cyber Security Strategy of the United Kingdom: Safety, Security and Resilience in Cyberspace. London, UK: Crown.
UK Office of Science and Technology. (2004) Cyber Trust and Crime Prevention Project: Gaining Insight from Three Different Futures. London, UK: Crown.
Vandebosch, H. and Van Cleemput, K. (2008) Defining cyberbullying: A qualitative research into the perceptions of youngsters. CyberPsychology & Behavior 11 (4): 499–503.
Walsh, M. (2003) Teaching qualitative analysis using QSR NVivo. The Qualitative Report 8 (2): 251–256.
Wang, J., Iannotti, R. and Nansel, T. (2009) School bullying among adolescents in the United States: Physical, verbal, relational, and cyber. Journal of Adolescent Health 45 (4): 368–375.
Willard, N. (2007a) Cyber Bullying and Cyber Threats. Champaign, IL: Research Press.
Willard, N. (2007b) Cyber-Safe Kids, Cyber-Savvy Teens. San Francisco, CA: John Wiley & Sons.
Wilson, D. and Jones, T. (2008) In my own world: A case study of a paedophile's thinking and doing and his use of the internet. The Howard Journal of Criminal Justice 47 (2): 107–120.
Wolak, J., Mitchell, K. and Finkelhor, D. (2007) Does online harassment constitute bullying? An exploration of online harassment by known peers and online-only contacts. Journal of Adolescent Health 41 (6): 51–58.
Wooding, S., Anham, A. and Valeri, L. (2003) Raising Citizen Awareness of Information Security: A Practical Guide, eAware Program. Berlin, Germany: RAND Europe.
Ybarra, M., Diener-West, M. and Leaf, P. (2007a) Examining the overlap in Internet harassment and school bullying: Implications for school intervention. Journal of Adolescent Health 41 (6): 42–50.
Ybarra, M., Espelage, D. and Mitchell, K. (2007b) The co-occurrence of internet harassment and unwanted sexual solicitation victimization and perpetration: Associations with psychosocial indicators. Journal of Adolescent Health 41 (6) : S31–S41.
Ybarra, M. and Mitchell, K. (2004) Online aggressor/targets, aggressors, and targets: A comparison of associated youth characteristics. Journal of Child Psychology and Psychiatry 45 (7): 1308–1316.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Martin, N., Rice, J. Children's cyber-safety and protection in Australia: An analysis of community stakeholder views. Crime Prev Community Saf 14, 165–181 (2012). https://doi.org/10.1057/cpcs.2012.4
Published:
Issue Date:
DOI: https://doi.org/10.1057/cpcs.2012.4